{"version":"1.0","provider_name":"Experis Cyber","provider_url":"https:\/\/experis.co.il\/cyber","title":"Monitoring - Experis Cyber","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"P1xHTF7Xx1\"><a href=\"https:\/\/experis.co.il\/cyber\/en\/services\/monitoring\/\">Monitoring<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/experis.co.il\/cyber\/en\/services\/monitoring\/embed\/#?secret=P1xHTF7Xx1\" width=\"600\" height=\"338\" title=\"&#8220;Monitoring&#8221; &#8212; Experis Cyber\" data-secret=\"P1xHTF7Xx1\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Threat Detection &#038; Monitoring The Threat Detection &#038; monitoring is the first layer of defense. It includes the deployment of an array of sensors that monitors the organizational data and detects threats. SOC \u2013 Security Operating Center Our innovative model of cyber-secuity protection services, is operated from a sophisticated Security Operating Center \u2013 SOC. It [&hellip;]","thumbnail_url":"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-MONITORING.jpeg"}